Lucene search

K
saintSAINT CorporationSAINT:D42BF0A06302C4D52A87233BC36F2B8A
HistoryOct 11, 2011 - 12:00 a.m.

Wireshark DECT Dissector PCAP File Processing Overflow

2011-10-1100:00:00
SAINT Corporation
my.saintcorporation.com
34

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.966 High

EPSS

Percentile

99.6%

Added: 10/11/2011
CVE: CVE-2011-1591
BID: 47392
OSVDB: 71848

Background

Wireshark is a network packet analyzer.

Problem

A buffer overflow vulnerability in the DECT dissector (epan/dissectors/packet-dect.c) allows command execution via a specially crafted **.pcap** file.

Resolution

Upgrade to Wireshark 1.4.5 or higher.

References

<http://www.wireshark.org/security/wnpa-sec-2011-06.html&gt;

Limitations

Exploit works on Wireshark 1.4.4.

The user must open the exploit file in the affected application.

The “Wireshark DECT Dissector Remote Stack Buffer Overflow” remote exploit attempts to exploit the same vulnerability. The remote exploit has additional network and PERL module limitations, but does not require user cooperation.

Platforms

Windows

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.966 High

EPSS

Percentile

99.6%